[11722] in Kerberos-V5-bugs
[krbdev.mit.edu #6793] memory leak
daemon@ATHENA.MIT.EDU (Arlene Berry" via RT)
Mon Oct 4 14:07:20 2010
Mail-followup-to: rt@krbdev.mit.edu
mail-copies-to: never
From: ""Arlene Berry" via RT" <rt-comment@krbdev.MIT.EDU>
In-Reply-To: <rt-6793@krbdev.mit.edu>
Message-ID: <rt-6793-33210.8.41849453290031@krbdev.mit.edu>
To: "'AdminCc of krbdev.mit.edu Ticket #6793'":;"'AdminCc of krbdev.mit.edu Ticket #6793'":;@MIT.EDU
Date: Mon, 4 Oct 2010 14:07:05 -0400 (EDT)
Reply-To: rt-comment@krbdev.MIT.EDU
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: krb5-bugs-bounces@mit.edu
We've got a report of memory being leaked in
src/lib/gssapi/krb5/acquire_cred.c. It looks like the problem is that
kg_init_name is being called on names with KG_INIT_NAME_INTERN set but
when kg_release_name is called on error paths there are no flags set.
This means that names are added to an internal database but never
removed from it and the associated memory is never freed. It looks like
the version of this code in trunk has been refactored and multiple uses
of kg_release_name have been replaced with a single use but both
versions call it without flags. Since this internal database is new to
me I'm not certain I understand it's purpose well enough to fix this.
Should the kg_release_name calls be changed to pass the flag?
_______________________________________________
krb5-bugs mailing list
krb5-bugs@mit.edu
https://mailman.mit.edu/mailman/listinfo/krb5-bugs